CVE-2022-49992
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves improper handling of swap page frame numbers (PFNs) in the memory management subsystem. Specifically, the function pfn_swap_entry_to_page() could be called incorrectly on a genuine swap entry, leading to a kernel bug (crash). The issue arises because the function was called without verifying the swap type, which could cause invalid memory references. The fix ensures that pfn_swap_entry_to_page() is only called for write migration entries where the page pointer is valid.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel BUG), leading to system instability or denial of service. Such crashes can disrupt normal operations, potentially causing data loss or requiring system reboots.